• Title/Summary/Keyword: Information Survivability

Search Result 166, Processing Time 0.025 seconds

Survivability Analysis of MANET Routing Protocols under DOS Attacks

  • Abbas, Sohail;Haqdad, Muhammad;Khan, Muhammad Zahid;Rehman, Haseeb Ur;Khan, Ajab;Khan, Atta ur Rehman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3639-3662
    • /
    • 2020
  • The network capability to accomplish its functions in a timely fashion under failures and attacks is known as survivability. Ad hoc routing protocols have been studied and extended to various domains, such as Intelligent Transport Systems (ITSs), Unmanned Aerial Vehicles (UAVs), underwater acoustic networks, and Internet of Things (IoT) focusing on different aspects, such as security, QoS, energy. The existing solutions proposed in this domain incur substantial overhead and eventually become burden on the network, especially when there are fewer attacks or no attack at all. There is a need that the effectiveness of these routing protocols be analyzed in the presence of Denial of Service (DoS) attacks without any intrusion detection or prevention system. This will enable us to establish and identify the inherently stable routing protocols that are capable to survive longer in the presence of these attacks. This work presents a DoS attack case study to perform theoretical analysis of survivability on node and network level in the presence of DoS attacks. We evaluate the performance of reactive and proactive routing protocols and analyse their survivability. For experimentation, we use NS-2 simulator without detection or prevention capabilities. Results show that proactive protocols perform better in terms of throughput, overhead and packet drop.

Ad hoc Software Rejuvenation for Survivability

  • Khin Mi Mi Aung;Park, Jong-Sou
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.141-145
    • /
    • 2003
  • We propose the model of Software Rejuvenation methodology, which is applicable for survivability. Software rejuvenation is a proactive fault management technique and being used in fault tolerant systems as a cost effective technique for dealing with software faults. Survivability focuses on delivery of essential services and preservation of essential assets, even systems are penetrated and compromised. Thus, our objective is to detect the intrusions in a real time and survive in face of such attacks. As we deterrent against an attack in a system level, the Intrusion tolerance could be maximized at the target environment. We address the optimal time to execute ad hoc software rejuvenation and we compute it by using the semi Markov process. This is one way that could be really frustrated and deterred the attacks, as the attacker can't make their progress. This Software Rejuvenation method can be very effective under the assumption of unknown attacks. In this paper, we compute the optimum time to perform an ad hoc Software Rejuvenation through intrusions.

  • PDF

A Development of 3D Penetration Analysis Program for Survivability Analysis of Combat System : Focused on Tank Model (전투 시스템 생존성 분석을 위한 3차원 관통 해석 프로그램 개발 : 전차 모델을 대상으로)

  • Hwang, Hun-Gyu;Lee, Jae-Woong;Lee, Jang-Se;Park, Jong-Sou
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.244-250
    • /
    • 2015
  • Survivability is avoidance and tolerance ability of combat systems for accomplishing mission in battle field. Therefore, the combat system has to protect or minimize any damage from threats. For this reason, many modeling and simulation based studies which analyze vulnerability of the combat system by threats, are in progress to improve survivability of the combat system. In this paper, we developed a 3D penetration analysis program for survivability analysis of combat system. To do this, we applied the penetration analysis equation to threat and protection performance of tank. Also we implemented simple tank models based on 3D CAD, and tested the developed program using the implemented tank models. As a result, we verified the developed program that is possible to analyze penetration by threat and protection performance of tank and to visualize its result, based on scenarios.

Classification of the Intrusion Tolerant Systems and Integrated Framework for Survivability Enhancement (생존성 강화를 위한 침입감내 시스템의 분류와 통합 프레임워크 제안)

  • Kim, Gi-Han;Chio, Myeong-Ryeoi;Lee, Kyung-Whan
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.295-304
    • /
    • 2003
  • Currently security researchers focus on protection of program and data from malicious users and accidents. Therefore, many firewalls and intrusion detection systems have been developed commercially. The intrusion tolerance is a new concept that is the last line of defense for the information survivability. It emphasizes availability and integrity to provide critical system services continuously even when system is compromised. In this paper, we classify current intrusion tolerant technologies from the point of view of program and data. Furthermore, we propose an integrated framework that supports intrusion tolerance of program and data.

Survivability Assessment using DMKB for IT infrastructure (DMKB를 이용한 IT 기반구조의 생존성 평가 시스템)

  • Choi Eun-Jung;Kim Myuhng-Joo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.9
    • /
    • pp.608-614
    • /
    • 2006
  • The popularization of high-speed networks and the innovation of high-performance hardware/servers have enlarged the role of large-scale, highly distributed IT infrastructure. Though many criteria on the assessment of IT infrastructure can be considered, the survivability assessment is treated as the most important one due to the essential role as an infrastructure. While assessing the survivability of some given IT infrastructures, we can not only choose the best one among them but also improve their survivability by modifying their structure and security policies. In this paper, we propose a DMKB-based assessment system on the survivability of IT infrastructures, where DMKB is a kind of database which provides the known vulnerabilities and defense mechanism for many system components.

A Study on the Enhancement of Network Survivability through Smart Sensor Technologies Convergence (스마트 센서 기술 융합을 통한 망 생존성 강화에 관한 연구)

  • Yang, Jung-Mo;Kim, Jeong-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.8
    • /
    • pp.269-276
    • /
    • 2016
  • Public Safty-LTE(Long Term Evolution) is being deployed in the direction of reducing cost by using both of municipal network and commercial network. However, LTE Network is difficult to ensure the survivability during the information communication infrastructure failures. In addition, it is vulnerable in communication coverage of inside buildings and underground. In this study, we propose to implement effectively the network survivability technique through the convergence to the proven technology. As the advent of the IoT Age, smart sensors which are embedded in the environment and the things will be able to provide a useful infrastructure for ensuring the network survivability. Based on the feature of the smart sensor, we designed the sink node architecture to guarantee the network survivability in disaster situation through the convergence of the small cell technology and extension of wireless network coverage technology. The computing power inherent in the environment is a valuable resource that can be utilized in the disaster situation.

Study on Multiple & Complex threat situation emulation for ASE System (생존체계 위협조우 상황인지를 위한 복합/다중 위협 상황 Emulation 연구)

  • Lee, Moon-Seok;Lee, Jung-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.516-520
    • /
    • 2010
  • As the substantial increase in battlefield density, multiple and complex weapon system, Ensuring the Survivability of the platform has been emphasized. Most of platforms have equipped with ASE (Aircraft Survivability Equipment) system in order to take action against at modernized hostile weapon under current battlefield. ASE system enhance the survivability of the platform through providing accurate situation awareness information by detecting and countermeasuring hostile threats. One of Key factor of the AE system performance is handling multiple and complex threats. Multiple and complex threat emulation is an effective means of ASE system verification In this study, It discuss system verification method before installation by dealing with complex threat situation consists of individual threat.

  • PDF

A Study of Survivable Alternate Routing Algorithm (생존성있는 대체 경로 라우팅 알고리즘 연구)

  • Park, Young-Chul
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.7
    • /
    • pp.535-539
    • /
    • 2007
  • We study an degree of alternativeness and a survivability of alternate routing algorithm in mobile ad-hoc tactical communication networks. The common channel signaling scheme is used and flood search routing algorithm is used for analysis. We also study a connectivity performance for flood search routing, restricted flooding and hybrid routing. From the results we expect low blocking probabilities with alternate routing and the conventional flood search routing shows better connectivity performance which results in high survivability.

Design and Management of Survivable Network: Concepts and Trends

  • Song, Myeong-Kyu
    • International Journal of Contents
    • /
    • v.5 no.2
    • /
    • pp.43-52
    • /
    • 2009
  • The article first presents a broad overview of the design and management for survivable network. We review the concept of network survivability, various protection and restoration schemes. Also we introduce design architectures of Quantitative model and a Survivable Ad hoc and Mesh Network Architecture. In the other side of study like these(traditional engineering approach), there is the concept of the survivable network systems based on an immune approach. There is one sample of the dynamic multi-routing algorithms in this paper.

A New Approach to DDOS Attack Defense Using the Survivability Concept of Router (라우터의 생존성 개념을 이용한 DDOS 공격 방어의 새로운 접근)

  • 송지영;박상준;김관중;김병기
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.8C
    • /
    • pp.741-747
    • /
    • 2002
  • In this paper, we present a new form of DDOS attack and a mechanism to defend systems from it. Up to now the ultimate target of a DDOS attack is a specific host. But in the near future router attacks are expected to appear. Because these kinds of attacks may involve many hosts in the managed domain of a specific router, they will be still more serious than the current DDOS attacks. Also, we present an algorithm to defend against an attack on a router using survivability of the router. By using a survivability of a router, the router can control a quantity of traffic autonomously without an interruption of services even when a DDOS attack occurs.